A framework for phishing attack identification using rough set and formal concept analysis

被引:0
|
作者
Syed Siraj Ahmed N. [1 ]
Acharjya D.P. [1 ]
Sanyal S. [2 ]
机构
[1] School of Computing Science and Engineering, VIT University, Vellore, Tamil Nadu
[2] Corporate Technology Office, Tata Consultancy Services, Mumbai
关键词
Decision table; Indiscernible; Information system; Phishing attack; Rough set;
D O I
10.1504/IJCNDS.2017.082105
中图分类号
学科分类号
摘要
Convergence of information and communication on technology changed the life of a common man over the last few years. At the same time it increases threats to a common man. In order to overcome these situations lots of research is carried out in the direction network and internet security. In addition identification of various attacks is of great challenge before taking any security measures. Identification of phishing attacks such as fake e-mails or websites is one such critical attack in internetworking. It is an illegal trick game that collects personal information from a legitimate user. The fake e-mails or website looking like a true one and even in the web pages where users are asked to send their personal information may look like a legitimate. Identification of such websites, e-mails is one of great challenge today. To this end, in this paper, we propose a model for identification of phishing attacks and chief attributes that make an object phishing object using rough set and formal concept analysis. The concept is explained with an illustration and followed by a case study. The results obtained show the viability of the proposed research. © 2017 Inderscience Enterprises Ltd.
引用
收藏
页码:186 / 212
页数:26
相关论文
共 50 条
  • [1] A knowledge elicitation framework in ranking healthcare providers using rough set with formal concept analysis
    Mohapatro, Arati
    Mahendran, S. K.
    Das, Tapan Kumar
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 23 (04) : 396 - 407
  • [2] Rough set approximations in formal concept analysis
    Yao, Yiyu
    Chen, Yaohua
    TRANSACTIONS ON ROUGH SETS V, 2006, 4100 : 285 - 305
  • [3] Rough set approximations in formal concept analysis
    Yao, YY
    Chen, YH
    NAFIPS 2004: ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY, VOLS 1AND 2: FUZZY SETS IN THE HEART OF THE CANADIAN ROCKIES, 2004, : 73 - 78
  • [4] Rough set model based on formal concept analysis
    Kang, Xiangping
    Li, Deyu
    Wang, Suge
    Qu, Kaishe
    INFORMATION SCIENCES, 2013, 222 : 611 - 625
  • [5] Using Formal concept analysis and Rough Set Constructing the System of Semantic web
    Xu, Hong-sheng
    Zhang, Rui-ling
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS II, PTS 1-3, 2011, 58-60 : 1664 - 1670
  • [6] Rough Set Approximation as Formal Concept
    Ytow, Nozomi
    Morse, David R.
    Roberts, David McL
    JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2006, 10 (05) : 606 - 611
  • [7] Rough Set Approximation as Formal Concept
    Graduate School of Life and Environmental Sciences, University of Tsukuba, Ibaraki, Tsukuba
    305-8572, Japan
    不详
    MK7 6AA, United Kingdom
    不详
    SW7 5BD, United Kingdom
    J. Adv. Comput. Intell. Intelligent Informatics, 2006, 5 (606-611):
  • [8] A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set
    Ahmed, N. Syed Siraj
    Acharjya, Debi Prasanna
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (04) : 28 - 52
  • [9] Formal Concept Analysis Based on Rough Set Theory and a Construction Algorithm of Rough Concept Lattice
    Yang, Haifeng
    EMERGING RESEARCH IN ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, 2011, 237 : 239 - 244
  • [10] A framework for using rough sets and formal concept analysis in case based reasoning
    Tadrat, Jirapond
    Boonjing, Veera
    Pattaraintakorn, Puntip
    IRI 2007: PROCEEDINGS OF THE 2007 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2007, : 227 - +